Video content analysis
Videonetics announces that it has joined the Qualcomm® Smart Cities Accelerator Program to provide their AI and Deep Learning powered Unified Video Computing Platform™ (UVCP) to diverse industries such as smart cities, aviation, enterprise and manufacturing to name a few. To exhibit their features and functionalities, Videonetics will be implementing their end-to-end video management system and AI enabled video analytics in conjunction with Qualcomm Technologies enabled smart cameras...
The world has changed with the COVID-19 pandemic. There are many new challenges and regulations. MOBOTIX’s intelligent video technology can support companies, institutions, public as well as private facilities during the crisis and in the restart after the lockdown. MOBOTIX has bundled the available "back-on-track video technology solutions" for its partners and customers to help get them up and running quickly and effectively. This makes it easier for industries and sectors such as retai...
A healthcare facility or hospital is unlike any other organization. It’s generally open to the public 24 hours a day, seven days a week. There is expensive equipment in many areas, patient records and confidentiality that needs constant protection, in addition to parking facilities and door access control needs and medicines that need to be kept secure. Hospital and healthcare settings use video surveillance in many ways, as the security needs of these institutions reflect the life-or-dea...
SAFR from RealNetworks, Inc., announced SAFR® Inside, a new app component of its Facial Recognition and Computer Vision Platform that runs on ACAP enabled cameras with edge processing capabilities. SAFR Inside reduces network traffic and server overhead and thus lowers overall deployment costs. The first version of SAFR Inside runs on the new AXIS Q1615 Mk III Network Camera announced. Facial recognition and mask detection SAFR Inside enables network cameras like the AXIS Q1615 Mk III to r...
PSA, the consortium of professional systems integrators, announces the addition of Mobile Pro Systems to its network. Mobile Pro Systems offers a family of different network/IP based mobile video surveillance systems utilized by many government and commercial entities. “Mobile Pro Systems’ technology is a great addition the PSA’s line card,” said Tim Brooks, PSA’s vice president of sales and vendor management. “They provide flexible and mobile solutions for p...
BriefCam, the industry’s provider of Video Content Analytics and VIDEO SYNOPSIS® solutions, announced significant new capabilities to its product portfolio with v5.6.1 of its innovative and extensible video content analytics platform. The new capabilities will help to prevent the spread of COVID-19 and support the safe and responsible re-opening across the globe. Face Recognition and Appearance Similarity New features available in v5.6.1 include: Proximity Identification: For effe...
TIBCO Software Inc., a pioneer in enterprise data, empowers its customers to connect, unify, and confidently predict business outcomes, solving the world’s most complex data-driven challenges. TIBCO announces that TIBCO Spotfire and TIBCO Data Science now support Microsoft Azure Cognitive Services. TIBCO's solutions extend these services to analyze multivariate anomalies and add root cause analysis, using input from the Key Phrase Extraction cognitive skill to render decisions and automate actions like anomaly detection. Performing predictive maintenance Using visual analytics and data science, sensor data and log data can be analyzed at the edge, including the ability to detect anomalies within reams of data and alert case managers to take preventive actions. “Increasingly, customers performing predictive maintenance must look for ways to leverage AI closer to where their data is generated for timely analytics and responses,” said Matt Quinn, chief operating officer, TIBCO. “TIBCO's approach to visual AI, analytics, and ML integrates well with Microsoft Azure AI and Cognitive Services. In particular, Microsoft's Python APIs are easily invoked from the TIBCO analytics offerings, giving our customers flexibility for AI core and edge scenarios, online and offline. The addition of Azure AI gives our customers flexibility and breadth of choice when using TIBCO Data Science with machine learning capabilities.” Improved operational efficiency With added cognitive services, clients will benefit from improved operational efficiency and lower equipment costs This initiative brings the power of TIBCO visual analytics and data science solutions to edge computing use cases where Internet connectivity is unavailable and clients need to process data in real time. With added cognitive services, clients will benefit from improved operational efficiency and lower equipment costs. Existing customers using Spotfire within their IoT environments cite ease of use and the ability to scale as key differentiators for their business. An education institution specializing in healthcare saw a drop of 74 per cent in onsite surgical infections as a result of making predictive decisions directly in operating rooms. Deploying AI solutions In addition, a manufacturing business in the semiconductor industry has used digital twins and model operations to detect geospatial anomalies within wafer maps and uncover millions in cost savings. “TIBCO has a strong track record of delivering advanced analytics and data science solutions,” said Bharat Sandhu, director, Azure Marketing, Microsoft Corp. “TIBCO has leveraged the power of Azure Cognitive Services to give customers even greater flexibility when deploying AI solutions – from performing equipment asset management and analyzing functionality, to identifying anomalous data points and alerting a case manager.”
SpotterRF, a company that specializes in designing Compact Surveillance Radar systems for highly critical sites, announces the integration of their Radar technology with the ULISSE COMPACT HD range of PTZ cameras manufactured by Videotec, creator of professional video surveillance cameras. In this integrated solution, the radar helps the camera to always look in the right direction by tracking potential threats in the vicinity. This greatly increases the value of the cameras by creating a fully automated system that enhances situational awareness and prevents incidents before they happen in large critical areas. Perimeter security Using cutting-edge radar technology, SpotterRF can pinpoint the GPS location of unwanted intrusions around the property and potential threats beyond the perimeter. In a perfectly synchronized operation and without human intervention, the radars rapidly and continuously send these exact coordinates to the connected Videotec PTZ cameras. The response is immediate and they can be programmed to zoom in for greater detail, capture sharp Full HD images of the target and send them in real time to the operator’s monitor. The system promptly sends alerts to operators of an alarm, and due to the near-zero false alarm rate of the radars, this occurs only when there is actually something of interest happening on the site. PTZ camera for surveillance The Videotec ULISSE COMPACT HD PTZ camera offers excellent visual surveillance capability coupled with high functional and mechanical performance in outdoor areas. With its wide field of vision and fast positioning, it is capable of capturing great quality Full HD images in the most adverse environments. The combined system from SpotterRF and Videotec has been proven in many real-world deployments worldwide, such as electrical substations, military zones, and other large sensible areas.
Exabeam, the Smarter SIEM™ company, announces an expansion of its technology partnership with CrowdStrike, a pioneer in cloud-delivered endpoint protection, to deliver its new application, Exabeam Ingestor for CrowdStrike, in the CrowdStrike Store. Exabeam Ingestor for CrowdStrike provides access to endpoint telemetry in the CrowdStrike Falcon platform and enables near real-time data streaming to detect advanced threats via a pre-built connector. This allows customers to augment their endpoint data with Exabeam’s user and entity behavior analytics (UEBA) to distinguish normal and abnormal behavior, helping to identify risky activity indicating a potential attack, even if it has never been seen before. Complex security management “By launching an app in the CrowdStrike Store, CrowdStrike and Exabeam deliver a fully-integrated SaaS offering that provides customers with the flexibility to solve complex security management problems, while also adhering to cloud-first and cloud-only procurement mandates,” said Nir Polak, chief executive officer of Exabeam. “Our goal is to empower SOC analysts to detect advanced threats and protect the enterprise, and this new application makes that possible in a robust, yet efficient way.” The application applies UEBA to near real-time endpoint telemetry in CrowdStrike Falcon Exabeam Ingestor for CrowdStrike provides yet another way for security teams to harness the power of CrowdStrike endpoint data. With seamless, one-click, cloud-to-cloud integration, the application applies UEBA to near real-time endpoint telemetry in CrowdStrike Falcon without any complexity associated with ingestion and indexing. Further, Exabeam Ingestor for CrowdStrike helps to detect advanced and insider threats with use cases including lateral movement, credential compromise, and data exfiltration. Advanced security challenges Via native integration with Exabeam Advanced Analytics, Exabeam Ingestor for CrowdStrike also helps analysts work smarter. With Exabeam, analysts can leverage automatic alert prioritization and machine-built incident timelines to dramatically decrease investigation times and mean time to respond (MTTR) to incidents. “With this partnership, we are providing our customers another use case for the industry-leading telemetry of the CrowdStrike Falcon platform and the power of the CrowdStrike Store, allowing them to solve for advanced security challenges without adding complexity,” said Amol Kulkarni, chief product officer, CrowdStrike. “We are pleased to strengthen our partnership with Exabeam and enable our customers to experience the combined power of our solutions.” The Exabeam Ingestor for CrowdStrike is now available in the CrowdStrike store and through Exabeam's reseller channel partners.
Motorola Solutions, announces a number of additions to its video security and analytics portfolio. These security solutions are designed to support organizations as they explore options for moving staff safely back into their offices or facilities. The offerings focus on the key elements of safety and security around COVID-19, including prevention, protection and response. “Enterprise organizations are exploring the best way to return back to the workplace, where ensuring the safety and security of their employees and customers is paramount,” said John Kedzierski, Senior Vice President, Video Security & Analytics at Motorola Solutions. Intelligence of AI-Powered analytics “Our customers have asked how our solutions can help mitigate the potential impacts of COVID-19 as they re-open their facilities, so we've developed a suite of applications that leverage the unique capabilities of video with the intelligence of AI-powered analytics.” Motorola Solutions’ video security and analytics portfolio will offer Avigilon security cameras with analytics to help organizations keep employees safe through the adherence of health guidelines around protective face masks and physical social distancing. These solutions combine the power of video and the intelligence of AI-powered analytics to collect visual footage and statistical patterns on where social-distancing protocols have been breached and where individuals are not wearing a face mask. Through Avigilon Control Center (ACC) video management software, organizations can be notified if guidelines are not observed and can quickly make informed decisions to address the situation. Physical access security The combination of physical access security and video footage can provide important insights The analysis increases employee safety by equipping organizations with the insights they need to implement measures that facilitate better compliance with health guidelines. The safety and security of front-line workers is a top priority for employers. Essential workers who face the risk of aggression and contamination may be equipped with Motorola Solutions’ body-worn cameras, so they can experience peace of mind, knowing that they have a direct link to security personnel at all times. Wearing these devices allows employees to verbally notify others that their actions are being captured on camera, which can often de-escalate a heated situation. As employees look to safely move back into the workplace, Motorola Solutions’ contact tracing capability can help deter the spread of COVID-19 in an organization’s offices or facilities. The combination of physical access security and video footage can provide important insights. Responsible use of analytics The new Identity Correlation Report helps employers better understand where an individual who has tested positive for COVID-19 has been, and which doors that person may have accessed within the workplace. By using this capability with Motorola Solutions’ Avigilon Appearance Search™ technology and Identity Search, security operators are able to add an extra measure of safety by generating timelines and video clips of the individual’s pathway throughout the premises, also showing who they may have been in contact with. These prevent, protect and response capabilities embrace Motorola Solutions’ commitment to the responsible use of analytics, as well as individual privacy rights.
Videotec is proud to announce that is has released a “robust and smart” video analysis technology, integrated into ULISSE EVO cameras, that offers an end-to-end solution for preventative detection of intrusions in outdoor monitoring applications of critical infrastructures, industrial sites and perimeters. Videotec Analytics is the result of more than 10 years of research and design, carried out by a team of R&D professionals, cooperating together with prestigious international universities and research centers. This technology was designed to be extremely reliable and proactive and be simple to configure and easy to use. Videotec analysis technology The ULISSE EVO camera with Videotec Analysis technology comprises robust algorithms for accurate PTZ detection and precise and smooth auto-tracking, even in the most adverse external environmental conditions. The operator will have complete situational awareness no matter the circumstances. A simple initial configuration will allow ULISSE EVO to detect an object or person present in a sensitive area. Depending on the rules set by the user, an alarm is displayed and auto-tracking activated if an object enters, exits, or appears or stops more than allowed in an area. The detection algorithm is extremely reliable even in rain, snow, where the camera is affected by vibrations, in low contrast or sudden light changes or shadows, and where small animals or insects are present. The auto-tracking keeps the target at the center of the frame through its very smooth pan and tilt action and zoom control. Integrated professional outdoor solution The metadata sent to the VMS system can be used to frame the target with a bounding box for clear identification This happens even if the target moves and changes direction quickly or if the area being monitored is in unfavourable lighting conditions such as low contrast, obstructions or sudden light changes. The metadata sent to the VMS system can be used to frame the target with a bounding box for clear identification of the subject or it can be used to activate alarms or begin recording. Depending on the rules set by the user, an alarm is displayed and auto-tracking activated if an object enters, exits, or appears or stays longer than a defined time. Videotec’s ULISSE EVO range with Video Analytics offers an integrated professional outdoor solution that is robust and performs better. Video analysis algorithms Videotec puts its all-in-one products through hundreds of validation tests in order to guarantee optimum robustness and reliability. Mechanics, electronics, positioning, networking, software, video analysis algorithms and firmware are developed end-to-end by Videotec’s own team who therefore have the complete know-how. ULISSE EVO therefore offers Videotec’s guarantee of being a reliable, cyber-safe, future-proof platform that is easily integrable with third-party products. Videotec’s new video analysis feature, combined with ULISSE EVOs optimum technology and image quality, ensure high level of protection for people, belongings and property.
Adarga is pleased to announce that it has signed a software license with BAE Systems Applied Intelligence, a business division of BAE Systems that helps customers to protect and enhance their critical assets. adarga engine AI-powered platform Adarga will deploy its powerful artificial intelligence platform, adarga engine, and analyst workflow tools, Adarga bench, that allow organizations to understand and work more efficiently with vast amounts of complex data. This agreement will see Adarga’s capabilities made available to the newly created Strategic Command (previously Joint Forces Command), part of the UK Ministry of Defense. Strategic Command Data analysis has proven to be time consuming and inefficient for human analysts and decision makers Strategic Command is the driving force behind the transformation of UK Defense from the Industrial to the Information Age in recognition that ‘it is no longer enough to have a battle-winning edge in terms of fire power; there’s a responsibility one needs to win the information battle’. This first license agreement with BAE Systems Applied Intelligence will leverage Adarga’s powerful software platform for use as a digital backbone to enhance user's ability to exploit information, data analytics and AI to enable faster and more accurate understanding and decision making. Enhanced data analytics capabilities Until now, data analysis has proven to be time consuming and inefficient for human analysts and decision makers, with the scale, speed and variety of data now far exceeding the ability to process it. With Adarga’s Artificial Intelligence platform at its spine, decision makers with responsibilities ranging from operations and intelligence to logistics and future-plans will be able to see and understand the situation with greater clarity than ever before, enabling faster and more effective action. Adarga – BAE Systems Applied Intelligence partnership Rob Bassett Cross, CEO of Adarga, commented, “Working hand in hand with one of the world’s renowned defense companies also marks another significant point in Adarga's journey and a further endorsement of the caliber of our software platform. We are delighted to be working with BAE Systems Applied Intelligence and look forward to making a transformative impact in addressing our customer’s greatest information challenges.” We are optimistic that this agreement will present opportunities for us to extend Adarga’s data analysis capability in Defense" Rob adds, “This is an important step in realizing Adarga’s vision to support real-world users’ ability to make vital decisions with greater speed and accuracy, and to help them achieve true Information Advantage. We are optimistic that this agreement will present further opportunities for us to extend Adarga’s data analysis capability in Defense and across a number of other sectors”. Deploying AI technologies Ed Gillett, Sales Director, BAE Systems Applied Intelligence, commented, “We are delighted to sign this license agreement with Adarga. We have been impressed with Adarga’s AI platform and the expertise of their team, however, what stands out the most is their genuine willingness to really understand our customer’s business challenges and work in detail to determine how, together, we can be as helpful as possible.” Ed adds, “We look forward to working with their team and to deploying new technologies that complement our existing systems and services. We have a long and proud track record of successful collaboration with exciting SME’s in pursuit of fast paced technological advantage and we are looking forward to further developing the relationship between our two companies.”
COVID-19 has already had a huge impact on the global economy. According to Statista, GDP growth globally will drop from around 3% to 2.4% - equivalent to a drop of around $35 trillion worldwide. In sectors like oil and gas, the impact is particularly acute: IHS Markit predicted that the reduction in oil consumption due to COVID-19 has led to a first-half surplus of 1.8 billion barrels of crude oil. The macroeconomic trends around these worldwide sectors point to harsher economic conditions and recession. For companies in the oil and gas sector running complex operations around the world, this will lead directly to tougher trading environments and a lot of necessary belt-tightening when it comes to costs around operations. Indirectly, the potential recession could cause more civil unrest and security threats for them as well. To cope with these potential challenges, companies will have to look at how they can maintain security for their operations and prevent risks as much as possible. Taking a contextual approach to physical security With these two goals in mind, looking at threat intelligence data should be considered. Threat intelligence refers to a set of data that can be used to judge current and future trends around risks, from everyday crime or political changes through to larger events like civil unrest, terrorism or the current pandemic. Based on data around these issues, companies can make better decisions on how they invest and manage their security posture in advance. Behind this overall approach, however, there are a significant number of moving parts that have to be considered. This includes where the data comes from, how it is used, and who is using the data. Companies can make better decisions on how they invest and manage their security posture The first consideration for threat intelligence is where data comes from. Typically, companies with large oilfields or refinery operations will have large investments in physical security to protect these environments, and part of this spend will include intelligence on local market, political and security conditions. Using this forecast data, your security leadership team can ensure that they have the right resources available in advance of any particular problem. This data can come from multiple sources, from social media data and crowdsourced information through to government, police and private company feeds. This mass of information can then be used to inform your planning and decision making around security, and how best to respond. However, one issue for oil and gas companies with distributed operations is how much data they have to manage over time. With so many potential sources of information all feeding back in real time, it’s hard to make sense of what comes in. Similarly, companies with international teams may have different sets and sources of data available to different parts of their organizations - while each team has its own view of what is going on, they may be missing out on contextual data from other sources held by neighbouring teams or by the central security department. Without a complete picture, it is easy to miss out on important information. Making threat intelligence smarter To solve this problem - and to reduce the costs around managing threat intelligence data - centralizing your approach can make it easier to provide that context to all your teams and stakeholders. Rather than letting each team set up and run their own threat intelligence approach, centralizing the data and letting each team use this can reduce costs. More importantly, it can improve the quality of your threat intelligence approach overall. By applying a combination of algorithms and security analysts to evaluate threat intelligence centrally, you can improve the quality of the data that you have coming into the organization in the first place. This approach provides higher quality data for decision making. However, a centralized approach is not enough on its own. Local knowledge and analysis is always useful. Consequently, alongside any centralization approach you have to have better filtering and search capabilities, otherwise you risk teams not being able to get the information that is particularly relevant and timely to them. This approach of bringing together centralized management of data feeds with more powerful tools for local teams to find what they want and get that access in real time represents the best of both worlds. Planning ahead Scenarios vary from a best case return to pre-crisis revenues of $50 to $60 per barrel by 2021 or 2022 According to consultancy firm McKinsey, the oil and gas sector faces an enormous challenge over the next few years. Scenarios vary from a best case return to pre-crisis revenues of $50 to $60 per barrel by 2021 or 2022, through to a worst case scenario where demand never returns and the industry has to undertake managed decline around some assets and look for new market opportunities in others. Whatever scenario plays out in the real world, security for existing assets will be a continued requirement. Planning ahead using threat intelligence data will be essential whatever happens. To help reduce costs and improve data quality, centralizing this approach will help. Without this mix of global oversight and local detail, companies will find their operations hampered and wrong decisions are made. It’s only by applying threat intelligence data in the right context that security teams will be able to keep up with the challenges of the future.
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
Artificial intelligence (AI) is improving everyday solutions, driving efficiency in ways we never imagined possible. From self-driving cars to intelligent analytics, the far-reaching impacts of Deep Learning-based technology empower human operators to achieve results more effectively while investing fewer resources and less time. By introducing AI, solutions are not merely powered by data, but they also generate valuable intelligence. Systems which were once leveraged for a narrow, dedicated purpose, can suddenly be engaged broadly across an organization, because the previously under-utilized data can be harnessed for enhancing productivity and performance. Video analytics software The video intelligence software processes and analyses video to detect all the people and objects that appear When it comes to physical security, for instance, video surveillance is a standard solution. Yet, by introducing AI-driven video analytics software, video data can be leveraged as intelligence in previously inaccessible ways. Here are some examples of how diverse organizations are using AI-based video intelligence solutions to enhance security and performance with searchable, actionable and quantifiable insights. Law enforcement relies on video surveillance infrastructure for extracting investigation evidence and monitoring people and spaces. Instead of manual video review and live surveillance – which is prone to human error and distraction – police can harness video content analysis to accelerate video investigations, enhance situational awareness, streamline real-time response, identify suspicious individuals and recognize patterns and anomalies in video. The video intelligence software processes and analyses video to detect all the people and objects that appear; identify, extract and classify them; and then index them as metadata that can be searched and referenced. Maintaining public safety For law enforcement, the ability to dynamically search video based on granular criteria is critical for filtering out irrelevant details and pinpointing objects of interest, such as suspicious persons or vehicles. Beyond accelerating video evidence review and extraction, police can leverage video analysis to configure sophisticated real-time alerts when people, vehicles or behaviors of interest are detected in video. Instead of actively monitoring video feeds, law enforcement can assess triggered alerts and decide how to respond. In this way, officers can also react faster to emergencies, threats and suspicious activity as it develops. Video analysis empowers cities to harness their video surveillance data as operational intelligence Empowering law enforcement to maintain public safety is important beyond the benefit of increasing security: A city with a reputation for effective, reliable law enforcement and enhanced safety is more likely to attract residents, visitors and new businesses, exponentially driving its economic development. Furthermore, in cities where law enforcement can work productively and quickly, time and human resources can be reallocated to fostering growth and building community. Video surveillance data Video analysis empowers cities to harness their video surveillance data as operational intelligence for optimizing city management and infrastructure. When video data is aggregated over time, it can be visualized into dashboards, heatmaps and reports, so operators can identify patterns and more seamlessly detect anomalous. A city could, for instance, analyze the most accident-prone local intersection and assess the traffic patterns to reveal details such as where cars are dwelling and pedestrians are walking; the directional flows of traffic; and the demographic segmentations of the objects detected: Are cars lingering in no-parking zones? Are pedestrians using designated crosswalks – is there a more logical location for the crosswalk or traffic light? Do vehicles tend to make illegal turns – should police proactively deter this behavior, or should the city plan new infrastructure that enables vehicles to safely perform these turns? Finally, does the rise in bike traffic warrant implementing dedicated biking lanes? With video intelligence, urban planners can answer these and other questions to facilitate local improvements and high quality of life. Video analysis empowers cities to harness their video surveillance data as operational intelligence Enhancing situational awareness Insight into traffic trends is also critical for transport companies, from public transit services to transportation hubs and airports. By leveraging the video insights about citywide traffic, public transit organizations can make data-driven decisions about scheduling and services. Analyzing video surveillance around bus stops, for instance, can help these companies understand the specific hours per day people tend to dwell around bus stops. Correlating this information with transactional data for each bus line, bus schedules can be optimized based on demand for individual bus lines, shortening waiting times for the most popular routes. Similarly, the traffic visualisations and activity heatmaps derived from the video of major transit hubs, such as international airports and central stations, can be beneficial for increasing security, enhancing situational awareness, identifying causes of congestion, improving throughput and efficiency and, ultimately, solving these inefficiencies to provide a streamlined customer experience for travellers. Large education campuses Campus law enforcement can leverage video data to increase situational awareness and public safety Much like a city, large education campuses have internal transportation services, residential facilities, businesses and law enforcement, and video content analysis can support the campus in intelligently managing each of those business units, while also providing video intelligence to these individual groups. Campus law enforcement can leverage video data to increase situational awareness and public safety, driving real-time responses with the ability to make informed assessments and accelerating post-event investigations with access to easily extractable video data. When campuses are expanding or developing additional infrastructure, they can plan new crosswalks, traffic lights, roads, buildings and entrances and exits based on comprehensive video intelligence. By understanding where pedestrians and vehicles dwell, walk, cross or even violate traffic laws, the campus can inform construction projects and traffic optimization. Countless business operations The campus can leverage video business intelligence to justify leasing pricing for different retailers across campusFinally, the campus can leverage video business intelligence to justify leasing pricing for different retailers across campus, demonstrating property values based on traffic trends that can be correlated with retailer point of sale data. Whether its empowering security, productivity or decision-making, the insights generated by AI-based technology can drive significant optimization – especially when data is fused and cross-referenced across smart sensors and systems for even deeper intelligence. In the case of AI-backed video analytics, diverse organizations can harness video surveillance impactfully and dynamically. Whereas once video technology investments could be justified for their security value – with the introduction of AI capabilities – procurement teams can evaluate these solutions for countless business operations, because they offer broadly valuable intelligence. And video surveillance and analytics is merely one example of AI-driven solutions’ potential to disrupt business as we know it.
Arteco’s VCA video analytics system is their latest new product, signaling a move from machine vision-based analytics to deep learning video analytics. A server – separate from the Arteco video management system (VMS) – manages the algorithms for the analytics. Arteco has been field-testing the product for a year and a half and had planned to launch it officially at ISC West in March (which was postponed). In lieu of the trade show launch, the company has been presenting the product (along with partners) through a series of webinars. The deep learning video analytics product operates out of the box – “just turn it on,” says Steve Birkmeier, Arteco VP of Sales. Functionality is based on “training” of pre-classified objects, such as differentiating between a person, an animal, a vehicle, or just clutter. The deep learning library focuses on people and vehicles. Detection and identification The new system detects everything in the field of view The new system detects everything in the field of view and only identifies what the operator is looking for, thus reducing false alarms. Any identified object is provided with an accuracy reading (e.g., 92% confident it is a human.) The system can be set up from the graphical user interface (GUI). Arteco VCA (video content analysis) also uses analytics rules, such as “if A+B=C, then do D.” Therefore, an abandoned object may elicit a different response than a violated area. With roots in the industrial automation market of the early-2000s, Arteco offers an event-based video management system (VMS) platform. That is, their emphasis is on identifying and providing video at the moment something happens rather than managing a vast amount of video that shows, in effect, nothing of interest. Arteco’s system, providing functionality expected in a full-featured VMS, is designed around the need to react to exceptions and events. Video verification “We can pull in events from any type of system and provide the related video,” says Steve Birkmeier, Arteco VP of Sales. “It can be access control, fire, intrusion, perimeter security, radar or microwave barriers, vape sensors, license plate recognition, or whatever.” An open connector, xml framework enables Arteco to interface with other systems and provide video verification of events. In addition to a focus on event-based video, Arteco also emphasizes ease of use, building on their 20-year history with video analytics. Another point of differentiation is their open architecture that easily and repeatably enables incorporation of third-party “events.” Finally, Arteco’s systems are competitively priced (less expensive), including flexible pricing and licensing structure to maximize value for a customer. In addition to security, there are multiple operational applications that use video verification In addition to security, there are multiple operational applications that use video verification. For example, integration with warehouse management software using metadata from warehouse surveillance video can provide a searchable database. An operator can enter a purchase order number, for instance, and the system provides video associated with that sale. The role of video in physical security Arteco has traditionally been a strong player in the utilities vertical, where event-based video management is useful to keep watch on high-value assets located in remote areas with little physical security. Another strong vertical is car dealerships in the United States, including security and loss prevention applications as well as integration with fleet management (using RFID and/or license plate reading). Arteco’s heat mapping capabilities can help a car dealer analyze customer activity to guide merchandising decisions, in the same way a retail store might. Big-box stores are another application for Arteco’s combination of marketing analytics, security and loss prevention. Arteco’s strength is also proving useful in the emerging, highly regulated cannabis industry. State regulations require that each marijuana plant be tagged, and systems are required to provide total chain of custody records from “seed to sale.” In the case of Arteco, video associated with a specific plant tag is available at each stage of growth, production and sale. Coronavirus and video management The analytics can detect when people are grouped together closer than 2 meters As an Italian company, Arteco has already applied its deep-learning VCA product at city centers in Italy, which was hard hit by the novel coronavirus. The analytics can detect when people are grouped together closer than 2 meters, for example, and can provide an alarm if social distancing requirements related to the coronavirus are not being observed. The system can also detect and confirm the use of face masks at an entrance. Tracking that number – the percentage of customers who comply – in real time might offer additional peace of mind for high-risk customers entering a store, for example. Birkmeier contends the world has been changed forever by the pandemic, although acceptance over time of new technologies being introduced will vary greatly by geographic location. Already, in the last decade or so, acceptance of video surveillance has been greater, even in the U.S. market, he says. ”More often you hear ‘why don’t you have cameras’ rather than ‘I don’t like these camera here,’” he comments.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilizing so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilizing a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organization, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualization tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organizations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson soccer game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analyzing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organizational change is difficult, and our team hopes to make the transition process easier for our customers.”
During the Parkland, Florida, school shooting in 2018, the shooter was caught on a security camera pulling his rifle out of a duffle bag in the staircase 15 seconds before discharging the first round. However, the School Resource Officer didn’t enter the building because he wasn’t confident about the situation, and the Coral Springs Police Department had no idea what the shooter even looked like until 7 minutes and 30 seconds after the first round was fired. If the video system had included technology to recognize the gun threat in real time, alerts could have been sent to the security team. An announcement could have been made right away for all students and faculty in Building 12 to barricade their doors, and law enforcement could have responded a lot faster to a real-time feed of timely and accurate information. Automatically recognizing gun threats Actuate offers such a technology, which the company says enables existing security cameras to automatically recognize gun threats and notify security in real-time. The technology is centred around a convolutional neural network (CNN) that aims to replicate how a human brain would process information. This neural network is trained to recognize what hands holding a firearm look like from hundreds of thousands of images in a proprietary data set. Over time, the system is able to mathematically calculate what a gun threat in a security camera feed looks like with a high degree of accuracy (well over 99% detection accuracy within the first 5 seconds), according to Actuate. “Active shooter situations are often marred by chaos and confusion,” says Sonny Tai, Chief Executive Officer of Actuate. “People are in fight-or-flight response and prioritize immediate survival instead of reaching for their phones and calling 911. When the 911 calls are made, callers often provide delayed, conflicting, and inaccurate information, inhibiting law enforcement’s ability to respond.” Enhances law enforcement response Tai says Actuate helps to clear up that chaos and confusion. “It provides visual intelligence of the location of the shooter, what they look like, what direction they’re heading, and what they’re armed with,” he says. “This real-time information enhances law enforcement response and enables building occupants to make critical decisions that maximize survivability." AI methods including deep learning enable high levels of accuracy in detecting weapons in real-time camera footage Tai is a Marine Corps veteran and a social entrepreneur who co-founded Actuate with the mission of addressing America’s gun violence epidemic. The start of the company stems from Tai’s upbringing in South Africa, where gun violence rates are some of the highest in the world. Growing up, several of his family friends were personally impacted, resulting in a lifelong passion for the issue of gun violence. In early 2018, Tai interviewed dozens of law enforcement leaders across the country and found that their biggest challenge in gun violence response was the lack of timely and accurate information. Actuate mitigates that challenge and enables both first responders and security staff to respond more rapidly, he says. More than 99% accuracy in detecting weapons Actuate is a software-only solution that plugs into security camera hardware and software, including VMSActuate's solution is completely AI-based, says Ben Ziomek, Chief Product Officer. AI methods including deep learning enable high levels of accuracy in detecting weapons in real-time camera footage. “Legacy, non-AI based solutions generally rely on older methods like motion detection, which is not reliable in differentiating between objects such as phones and firearms,” says Ziomek. “Our AI solution lets us achieve more than 99% accuracy in detecting weapons with an exceptionally low false-positive rate.” Ziomek runs engineering, data science, and operations for Actuate. Before joining the firm, he led teams of AI engineers and data scientists at Microsoft, leveraging AI to identify high-potential startups globally. Actuate is a software-only solution that plugs into existing security camera hardware and software, including video management systems (VMS). Existing capabilities of a customer’s VMS does initial, basic analysis and then routes the remaining video to Actuate’s processing units for AI analysis. Alerts can then be sent back however a customer wants, including through a VMS. Actuate can also feed information into a PSIM or command-and-control system if requested by a customer. Equipping customers with AI tools Our current focus for the company is to get our technology into the hands of as many customers as possible"As an early-stage company, Actuate is pursuing customers through multiple routes, including directly to end-users and via security integrators, distributors, and dealers. They are currently deployed at diverse customer sites including schools, office buildings, industrial facilities, and public buildings, says Ziomek. “Our current focus for the company is to get our technology into the hands of as many customers as possible,” says Ziomek. “We are working closely with customers across segments and industries to equip them with the tools they need to make their spaces safer. We’re currently working on educating the market on our offerings, as this technology is very new to many security organizations.” There are no privacy or compliance concerns because Actuate stores no customer data until a weapon is detected, and even then the data is not cross-indexed with any sensitive information, says Ziomek.
viisights, the developer of innovative behavioral understanding systems for real-time video intelligence based on AI, announced that it has deployed a smart city traffic monitoring system in the city of Ashdod, leveraging the NVIDIA Metropolis intelligent video analytics framework. “This project signifies how smart cities like Ashdod increase safety, mobility and quality of life by state-of-the-art traffic monitoring driven by computer vision-based on AI,” said Asaf Birenzvieg, co-founder and CEO of viisights. “viisights traffic monitoring capabilities are based on our revolutionary video understanding technology that helps in analyzing hundreds to thousands of real-time traffic video streams and alerting on complex traffic situations, including accidents, hazards and predicting and managing traffic congestion. We see this project as an example of how a city can be really smart and as a validation of the growing demand for our behavioral understanding solutions.” Intersection blocked Using NVIDIA GPUs and the DeepStream SDK within NVIDIA Metropolis, viisights’ innovative traffic monitoring system provides highly scalable and cost-effective solutions for real-time analysis of thousands of video streams. viisights video intelligence system deployed in Ashdod provides real-time advanced behavioral understanding of traffic actions and events in live video streams by monitoring intersections, crossroads, roads and streets. This enables municipalities to quickly address events of interest such as accidents, disturbances to traffic (for example, vehicles stopping in a junction or on a sidewalk), road hazards (for example, people getting in and out of vehicles in dangerous areas) and monitor traffic flows and report on various statistics. viisights technology protects public privacy by only analyzing general behavior patterns of individuals, groups, vehicles and traffic-flows. It does not identify faces or license plates. Car collision information This cutting-edge, first-of-its-kind technology from viisights assists municipalities to secure traffic flow, prevent blockage and attend to road hazards, while also enhancing their essential role in securing the life and safety of inhabitants; first responders can arrive faster at scenes of life-threatening situations, minimize injuries, and attend to dangers in traffic and more. “We are extremely proud to be at the forefront of smart city technology by being the first city in Israel to define and use this behavior recognition technology for the benefit of Ashdod citizens,” said Gamliel Edri, technologies & CCTV control room department manager for the city of Ashdod Municipality. “The viisights’ system strengthens our ability to ensure the safety and security of our citizens and even save lives. We look forward to broadening our successful collaboration with viisights to other parts of the city.”
The German video technology manufacturer Dallmeier is looking back on three extremely successful years in the "Safe City" market sector in Germany. To date, the inventor of the "Panomera" multifocal sensor technology with cameras, recording systems and software for video analysis and management has been able to execute 19 major projects in German cities. Successful investigations into recent incidents once again confirmed the quality of the systems. Essentially, three factors determine the success or failure of the use of video security technology in public spaces: on the one hand, it is important to guarantee a high and, above all, as consistent a minimum image quality as possible over the entire area to be recorded - this is the only way to ensure that the images can be used in court and, above all, to ensure positive results in the automatic analysis of these images. Multifocal sensor systems Breakthrough in the "Safe City" sector came at the end of 2016 with the commissioning of camera systems Secondly, this goal should, of course, be achieved with the fewest possible number of camera systems in order to keep overall costs, complexity and the workload of system operators low. And finally, the quality of the video management software used and the analysis of live images and recordings is of crucial importance. These three elements together form the essential added value of the patented "Panomera" multifocal sensor systems, which Dallmeier successfully launched on the market in 2011. The breakthrough in the "Safe City" sector came at the end of 2016 with the successful commissioning of the camera systems on the Domplatte (cathedral square) in Cologne. High resolution recordings Here, the police can observe an area of almost 9000 square meters with only eight Panomera cameras, and this with a minimum resolution density of 250 pixels per meter (px/m, according to DIN EN 62676-4). This very resolution is required to be able to recognize unknown individuals. With large-scale installations in 19 German cities, including Frankfurt, Essen, Wiesbaden, Chemnitz and Bremen, the manufacturer can look back on an extremely successful track record in the field of urban surveillance. "We have been using the Dallmeier Panomera technology since 2018 with great success. With the Panomera systems we benefit in particular from the fact that the entire overview of a scene is always maintained, whereby operators can zoom into different areas with high resolution even in the recording," says Thorsten Wünschmann, Head of the Hanau (a German City near Frankfurt) Public Order Office. Video security solutions "In this way, we achieve optimum control with minimum operator workload and, thanks to the fact that only a few systems are required, we also achieve low total cost of ownership". Dallmeier develops and manufactures all essential components of its solutions at its headquarters in Germany" A further, very important aspect for market acceptance is also data protection: Dallmeier fulfills this requirement by strictly observing the GDPR guidelines "Privacy by Design" and "Security by Design". Dallmeier develops and manufactures all essential components of its solutions at its headquarters in Germany, uses external service providers for extensive penetration and security tests and offers its customers comprehensive documentation and support in the implementation of video security solutions that comply with data protection regulations. Feedback from emergency services "We are very proud of our success in the Safe City sector over the past few years. Dallmeier technology is being used for more and more installations in large cities, but also increasingly in medium-sized cities." "Extremely rapid, successful investigations, not least with regard to the most recent events in Southern Germany, and consistently very positive feedback from the emergency services as well as the decision-makers attest to our strategy", says Frank Salder, Managing Director of Dallmeier Systems GmbH in Gladbeck and Germany-wide expert for Safe City within the Dallmeier group of companies. Extremely economical operation "The patented Panomera Multifocal sensor technology enables an extremely low number of systems required. For example, it is possible to cover 40,000 square meters with only 58 Panomera cameras at a minimum resolution density of 250 pixels per meter (px/m, according to DIN EN 62676-4). Together with the resulting much lower demands on the infrastructure, and of course, considerably fewer operator workstations, this also results in an extremely economical operation of the systems". Dallmeier Webinar on 28 May 2020, 4:30 PM – 5:15 PM CEST on the topic “Multifocal Sensor Technology for "Safe City": Functionality, Benefits, Real-World Examples” Special Issue "Video Extra”: Camera manufacturer recommends fewer cameras Dallmeier Solutions for Safe Cities
Verint® Systems Inc., The Customer Engagement Company™, announces one of the world’s largest banking organizations selected Verint as its new standard solution for enterprize fraud and security investigations. The selection resulted after a thorough analysis of technologies that best fit the bank’s fraud investigation, cybersecurity and deployment management requirements. The bank chose Verint’s enterprize-class recording platform to enhance compliance and fraud control across its network of retail branches and ATMs. The solution combines the powerful network video recorder with robust software for review and enterprize management. Delivering innovative solutions “Verint is focused on developing innovative technologies that help financial institutions reduce fraud and security risk, drive productivity, and help these organizations simplify and modernize their operations,” says Verint’s Matt Tengwall, General Manager, fraud and security solutions. “As the market leader, Verint’s suite of fraud and security solutions are designed to address the unique requirements of banks and credit unions." "We believe the bank’s selection provides validation of our proven ability to deliver innovative solutions that address compliance and fraud control and help leading banks reduce loss and address potential risk.” Verint’s advanced fraud and security solutions can help banks and credit unions identify risks and vulnerabilities in real time, helping fraud investigators mitigate threats, and ensure compliance.
Car theft is a concern for many people, so imagine if one person was responsible for a whole load of them. Car dealer P. Christensen in Denmark knows this headache from personal experience, suffering a number of thefts from their fenced area. It was time to ramp up security, so they turned to Telesikring, the largest private-owned security company in Denmark, for a perimeter detection solution. Telesikring upgraded security with a solution using Hikvision surveillance cameras. Despite existing security measures like electric fences and burglar alarms, the car dealership was still experiencing thefts. Thieves were managing to come up with increasingly imaginative ways to beat the system – like crawling over fences and even digging underneath them. Perimeter detection solution They stole all sorts of items, including wheels and catalysts from the cars and vans exhibited at the site. These represent quite some value, and the cost of these losses was mounting up. They needed a solution which could work for them in all sorts of weather conditions and in the dead of night – the most vulnerable time. The premises have some quite remote outlying areas, which were also particularly at risk. The car dealership is now monitored using a perimeter detection solution made up of both conventional and thermal cameras. These cameras are connected to a Milestone VMS with analysis software. In turn, this has a direct connection to the Jutland Control Center, a local Alarm Receiving Center that monitors the property 24/7. Thermal Network Bullet Camera These cameras provide excellent images even in the lowest of light levels, making the ideal for remote verification Now it’s not possible to enter the property outside of opening hours - day or night, without this being registered by the control center. The information they receive from the analysis software enables them to make an informed decision on their response, for example sending a guard patrol. Thermal cameras were chosen because of the reliability in all weather conditions. This solution specifically used the Thermal Network Bullet Camera (DS-2TD2136-10). Once the thermal camera detects a break-in, it sends an alarm to the ARC and the operator there can use the low-light clarity delivered by the DarkFighter cameras (DS-2CD4B26FWD-IZS) also present to verify the alarm. These cameras provide excellent images even in the lowest of light levels, making the ideal for remote verification. Effectively prevented burglary Henrik Finn Sanderlund, Quality Manager at P. Christensen, says: “Yes, we are very satisfied! Since the deployment of the system, this has effectively prevented burglary and theft. The solution was deployed on a Thursday and on Friday the solution caught the first break in, effectively preventing it.” Managers at P. Christensen can now rest at night, safe in the knowledge that security innovation is keeping an eye on the property.
Norfolk and Suffolk Constabularies have purchased nearly 4,000 Sepura SC21 TETRA radios in a joint force investment, equipping their officers with powerful, compact critical communication devices. The decision to invest in Sepura radios followed a thorough trial by both forces, from which users gave the SC21 their enthusiastic approval, and a comprehensive business case analysis, covering support, pricing and evolution of the product. Allowing clear communication The SC21 is a compact version of Sepura’s SC20 radio, combining high levels of robustness and functionality without compromising on performance. This was backed up by users on the trial, who praised in the SC21 in particular for its rich, clear audio, allowing clear communication even in noisy environments, as well as the compact design which takes up a minimum of space on an officer’s uniform. Officers also praised the excellent battery life and robust design of the radio, while commentating that the intelligent user interface made it quick and easy to perform primary functions. T/Assistant Chief Constable Steve Mattin, Joint Protective Services Lead, welcomed the rollout saying: “Good communications is fundamental to our policing service and the SC21 will provide us with the support we need to give the best policing service we can to our communities.” Installation of charging equipment The SC21 is part of Sepura’s SC Series of radios, featuring hand portable and mobile radios “After considering the options available to us it was clear that Sepura’s SC21 was the unanimous choice of both our front line officers and our operations teams. Sepura’s support is outstanding and they are working closely with us to help manage our transition to the new devices, including assisting with training and the installation of charging equipment, ensuring that our staff will be fully prepared for the transition.” Says David Woods, Joint ICT airwave specialist for Norfolk and Suffolk Constabularies. “We have seen many UK organizations adopt SC Series radios from Sepura as they look to equip their users with modern, powerful devices to support their operations. The SC21 is unique in the market in having such advanced features in a compact device and as such offers both Suffolk and Norfolk Constabulary users the best of both worlds.” Says Dawn Griffiths, Business Development Manager at Sepura. The SC21 is part of Sepura’s SC Series of radios, featuring hand portable and mobile radios, supplemented by powerful applications and flexible accessories to support public safety officers communicate efficiently. Sepura are the supplier to UK police forces as well as many other police forces in Europe and throughout the world.
Recently, Planet Fitness, with the help of their preferred system integrator Adirondack Direct, incorporated a video surveillance solution from Hanwha Techwin and Genetec that not only enhances security, but also improves operations. When leadership evaluated security at their 70-plus corporate run locations a few years ago, they chose to incorporate a video surveillance solution that would address security needs and would be advanced enough to help with management and operations. Each of Planet Fitness’ corporate-owned clubs throughout North America is outfitted with approximately eight to 15 video cameras that provide around the clock coverage of the parking lot, lobby, break room, the fitness area where members workout and other key areas – without invading private areas, such as locker rooms and other intimate spaces. After issuing a Request for Proposal, Planet Fitness Senior Vice President of Corporate Club Operations Jim Esposito said they tested several of the leading camera and video management software (VMS) solutions, but ultimately decided on Hanwha video surveillance cameras managed by the Genetec Security Center platform. Esposito said they wanted to use Hanwha’s 360-degree cameras in particular because they provide more coverage, yet they save in hardware expenses because fewer cameras are needed. 360-degree fisheye camera Hanwha’s SNF-8010 5 MP 360-degree fisheye camera provides 5MP at 20FPS which captures smoother video at a higher framerate with true day and night function. Built-in on-camera de-warping allows instant access to PTZ, quad view, and panorama views. Alarm triggers for the Hanwha SNF-8010 include intelligent motion detection, audio detection, tampering detection, alarm input and network disconnection.Adirondack Direct also offers a 24-hour monitoring service and liaisons with law enforcement when needed A typical system setup at Planet Fitness includes placing cameras 25 feet from the wall and 50 feet apart which provides almost 2,000 square feet of coverage per camera. Club managers, regional managers and corporate employees manage the system via the Genetec Security Center which provides convenient bookmarks of recorded incidents so that – instead of time spent searching through video – events are already tagged. Adirondack Direct also offers a 24-hour monitoring service and liaisons with law enforcement when needed. “We knew that Planet Fitness would need thousands of video surveillance cameras for this project and it’s very important to consider reliability and functionality as well as durability,” said Adirondack Direct Director of Security and Technology, Tim Collins. “Hanwha has the lowest customer return number and that means that they manufacture products that aren’t sidelined by constant replacement and repairs.” Collins said Adirondack Direct has long recommended Genetec’s Security Center for video surveillance management because it provides the best open-architecture platform, robust features and is easy to use. Security Center blends IP security systems within a single intuitive interface to simplify operations and empowers organizations through enhanced situational awareness, unified command and control and connectivity to the cloud. When a Lunk Alarm is pressed, Genetec’s Security Center creates a bookmark of the event which provides video evidence of what preceded the alarm and how it was managed Business intelligence While the Hanwha-Genetec solution has provided an excellent security system – as well as protection against liability for slip and fall incidents – it’s also improved operations in multiple ways by providing invaluable business intelligence, said Esposito. Planet Fitness has a judgement-free environment for individuals who want to work out, but don’t want to have to endure the negatives so often found in gyms: loud grunts, the clanging of dropped weights and aggressive behavior. Anyone engaging in obnoxious behavior will likely be the recipient of a Lunk Alarm and the flashing lights, sirens and unwanted attention that accompanies it.Use of the Lunk Alarm – or lack of use – can be an indicator of how the club is operating Use of the Lunk Alarm – or lack of use – can be an indicator of how the club is operating. In order to monitor and evaluate use of the Lunk Alarms, Adirondack Direct has integrated the Lunk Alarm into the Hanwha-Gentec video solution. When a Lunk Alarm is pressed, Genetec’s Security Center creates a bookmark of the event which provides video evidence of what preceded the alarm and how it was managed. Potential medical emergencies Gyms typically have automated external defibrillators (AEDs) in the event a member suffers a medical emergency. At Planet Fitness facilities outfitted with the Hanwha-Genetec solution, once an AED is removed from its cabinet, a sensor is activated to shut off the music in the club to provide a calmer atmosphere. The system also creates a bookmark in the VMS and notifies managers and regional managers that an AED has been deployed. The Hanwha-Genetec Planet Fitness solution also provides key employee analysis that can help managers identify areas of improvement. Each facility has rubber floors that must be cleaned daily and Adirondack Direct has placed a sensor on a floor scrubber that creates a bookmark and recording in Security Center when the device is moved. Video evidence verifies whether the floor was actually cleaned or if the scrubber was just relocated. Break room sensors Each break room is outfitted with a sensor that creates a video bookmark every time the door is opened. If an employee visits too often, Planet Fitness management can reorient that employee on the proper policies and procedures. For day to day efficiencies, video analytics can be a valuable tool. If an employee is constantly leaving the front desk to go to a storage closet for a particular item, they can make changes including moving the item closer to the front desk. “If during an overnight shift the camera indicates that there was no motion at the front desk for a prolonged period of time, then that’s a problem,” said Esposito. “We expect someone to be in that position greeting and welcoming members so if someone isn’t there, the video can help us understand why.”If an employee visits the break room too often, Planet Fitness management can reorient that employee on the proper policies and procedures A big question for Planet Fitness – that can be answered via video analytics – is have they been losing sales opportunities without realizing it? “What we’re exploring now is a virtual line that counts the number of people that come and go in the club,” said Esposito. “We know how many people check in. So, if a club checks in 500 people in a day, but there are 600 people that enter the door, that can be lost revenue.” Esposito said they chose Hanwha cameras and the Genetec platform because they knew that they needed a solution that was at the forefront of technology, with the flexibility to grow with them and meet their future needs. He added the solution delivers a safe environment that is appreciate by everyone. “It’s somewhat of a security blanket for our members and employees,” he said. “They appreciate our no intimidation mantra and the fact that we have created this safe and secure environment that offers a judgement free zone where people can do their own thing.”
Round table discussion
While unpacking our bags from a trade show, it is interesting to consider the dominant themes and trends we heard and saw at the show. So it is with the recently concluded Global Security Exchange (GSX) show in Chicago, presented by ASIS International. Amid all the product promotion, training sessions, networking and tired feet at the show, what really stood out? We asked this week’s Expert Panel Roundtable: What was the big news at the GSX 2019 trade show in Chicago?
Technology advancements often come with new terms and definitions. The language of our marketplace evolves to include new words that describe innovations in the industry. In the skilled hands of marketers, terms intended to be descriptive can also take a new element of ‘buzz,’ often presaging exciting developments that will drive the future. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the industry?
By definition, an edge device is an entry point to a network. In the physical security industry, edge devices are the cameras, sensors, access controllers, readers and other equipment that provide information to the IP networks that drive today’s systems. In the Internet of Things (IoT), edge computing refers to an increasing role of edge devices to process data where it is created instead of sending it across a network to a data center or the cloud. In our market, edge computing takes the form of smarter video cameras and other devices that store and/or process data locally. We asked this week’s Expert Panel Roundtable: What’s new “on the edge” of security and video surveillance systems?
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload